Investigating vulnerability CVEs for PhotonOS-based appliances
book
Article ID: 325921
calendar_today
Updated On:
Products
VMware Aria Suite
Issue/Introduction
This KB serves as a guide to identify validity of reported vulnerabilities/CVEs in PhotonOS-based VMware applications from a security scan.
You have recently scanned the application using a vulnerability scanner and identified CVE(s) that are impacting the system.
You have checked the VMware product release notes, VMSAs, and have reviewed existing Knowledge Articles for the CVE in question and cannot ascertain its fixed state.
Environment
All PhotonOS-based VMware applications
Resolution
Validate RPM packages and PhotonOS versions
Prerequisites:
You have SSH access with root username and password for the VMware application.
Procedure
Document the VMware application version by using the About or Help functions in the product UI.
Verify the PhotonOS version in an environment by running the following command: cat etc/photon-release
Gather the audit data on how the scanner is looking for this vulnerability. This is often a simple rpm version check for PhotonOS based appliances.
Verify the rpm packages installed on the system: rpm -qa | grep packagename
Compare this information from the appliance against the vulnerable version in the CVE and scan data.
As long as the package is on the version that the CVE has been fixed in or higher, or it doesn't show up, this verifies that the CVE has been fixed and can be safely ignored.
Take this information to your scanning team and request they have a case opened with the necessary vulnerability scanner support team.
If you are unsure of the validity of the information you have collected, open a support case with VMware by Broadcom for additional guidance.
Ensure you include the following:
Scan data
Vendor of vulnerability scanner
Details of the checks being performed against the system